{"id":49940,"date":"2022-05-09T09:44:02","date_gmt":"2022-05-09T01:44:02","guid":{"rendered":"https:\/\/version-2.com\/?p=49940"},"modified":"2022-05-30T10:42:10","modified_gmt":"2022-05-30T02:42:10","slug":"cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/05\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/","title":{"rendered":"Cybersecurity Health: What it is and how to comply with HIPAA"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"49940\" class=\"elementor elementor-49940\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><span style=\"font-weight: 400;\">Infrastructure security breaches damage healthcare organizations. A vulnerability in a hospital\u2019s cybersecurity network could expose sensitive patient data to those with malicious intent to use and take advantage of it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Electronic health records can be encrypted and rendered useless by cybercriminals who often demand a ransom in exchange for your encryption key. And confidential data can be sold all over the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For a healthcare company to remain compliant with the guidelines and requirements set forth by legislation such as the Health Insurance Portability and Accountability Act (HIPAA). Under this law, healthcare organizations must protect the personal information of their patients and customers. HIPAA is a federally passed law in the United States that protects confidential health information from being released without the patient\u2019s consent or knowledge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to growing threats, healthcare organizations everywhere are stepping up their cybersecurity investment, increasing their IT budgets and hiring professionals with at least some cybersecurity training. These security experts are responsible for keeping vast amounts of patient information secure and accessible only to authorized employees and affiliates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Continue reading the article and learn how cybersecurity technologies and processes work in healthcare.<\/span><\/p>\n\n\n<h2><b>What is HIPAA Compliance?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. Companies dealing with protected health information must have physical, network and process security measures in place and follow them to ensure compliance with HIPAA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Entities that provide treatment, payment, and operations in healthcare, as well as business partners that have access to patient information and support treatment, payment, or operations, must meet HIPAA compliance. Other entities, such as subcontractors and any other related business associates, must also comply with legislation.<\/span><\/p>\n\n\n<h2><b>What is the need for HIPAA compliance?<\/b><\/h2>\n<p>&nbsp;<span style=\"font-weight: 400;\">The HHS (The United States Department of Health and Human Services) points out that healthcare providers and other entities that handle any health information that can be linked to an individual will migrate to computerized operations. These operations include computerized medical order entry (CPOE) systems, electronic health records (EHR) and radiology, pharmacy and laboratory systems. So HIPAA compliance is more important than ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Likewise, health plans offer access to claims, care management and self-service applications. While all of these electronic methods provide greater efficiency and mobility, they also dramatically increase the security risks faced by health data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is in place to protect the privacy of individuals\u2019 health information, while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Policies, procedures, and technologies must be implemented that are appropriate to the entity\u2019s size, organizational structure, and risks to patient and consumer ePHI.<\/span><\/p>\n\n\n<h2><b>What processes and procedures are required for HIPAA compliance?<\/b><\/h2>\n<p>&nbsp;<span style=\"font-weight: 400;\">HHS requires physical and technical safeguards for organizations that host sensitive patient data. Physical protections include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limited access and control of facilities with authorized on-site access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policies for use and access to workstations and electronic media.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restrictions on transferring, removing, disposing and reusing electronic media and ePHI.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Along the same lines, HIPAA technical safeguards require access control allowing only authorized personnel to access ePHI:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using unique user identities, emergency access procedures, automatic logoff, and encryption and decryption.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Audit reports or trace logs that record hardware and software activity.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Other technical policies for HIPAA compliance must cover integrity controls or measures implemented to confirm that the ePHI is not altered or destroyed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IT disaster recovery and offsite backup are key components that ensure electronic media errors and failures are quickly corrected so that patient health information is retrieved accurately and intact. A final technical safeguard is network or transmission security which ensures that HIPAA compliant hosts protect against unauthorized access to the ePHI.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">This protection addresses all methods of data transmission, including email, internet, or private networks, including cloud infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To help ensure HIPAA compliance, the US government passed a supplementary law, the Health Information Technology for Economic and Clinical Health (HITECH) Act, which increases penalties for healthcare organizations that violate privacy rules and HIPAA security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The HITECH Act was implemented due to the development of health technology and the increase in the use, storage and transmission of electronic health information.<\/span><\/p><\/div>\n\n<h2><b>Why does HIPAA need cybersecurity?<\/b><\/h2>\n<p>&nbsp;<span style=\"font-weight: 400;\">HIPAA helps protect sensitive patient health information, including treatment details, test results, personally identifiable data, and demographic information from being disclosed without the patient\u2019s consent.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to better protect a patient\u2019s personal health records, the HIPAA Security Rule specifies that covered entities must maintain protection for electronically protected health information (ePHI) and ensure that protection can defend the organization from any type of physical, administrative or technical violation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This can be done through an effective cybersecurity strategy, but to avoid complications or sensitive data breaches, it\u2019s important to consider the following best practices.<\/span><\/p>\n<h3><b>Protect patient data in transit or at storage<\/b><\/h3>\n<p>&nbsp;<span style=\"font-weight: 400;\">All data that healthcare providers store is extremely confidential. While only available to authorized personnel, this data is highly valuable to a malicious actor and can be easily accessed if not managed properly. To better protect this information, healthcare systems must protect patient data during transit and during storage.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Both data in storage and data in transit are valuable and vulnerable to attackers. By providing quality security measures for both data sources, we can ensure that data is protected in any state.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">We can better protect data in storage by encrypting sensitive files before storing them on a device, or even encrypting the storage device itself. The same goes for data in transit. Companies can encrypt sensitive data before transporting it and use encrypted connections (through HTTPS, SSL, TLS, FTPS, etc.)<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">For example, when a confidential email is sent with test results from a lab, companies use an encryption program to hide its contents. Encryption is a prominent tool used to secure data and should be implemented in all practices to better protect patient data and maintain <\/span><span style=\"font-weight: 400;\">HIPAA compliance.<\/span><\/p>\n\n\n<h3><b>Ensure remote service security<\/b><\/h3>\n<p>&nbsp;<span style=\"font-weight: 400;\">With millions of people still connecting to their healthcare providers via remote access, internal IT teams need to ensure that remote security and patient details are protected in the process. Not only must your remote technology meet HIPAA security and privacy standards, it must also meet the diverse needs of your patients seeking long-term care.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">It is important for providers to set clear guidelines for the remote use of healthcare tools and understand how HIPAA requirements affect remote work environments.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">With healthcare organizations increasingly using technology for day-to-day operations such as video conferencing, data-sharing platforms and project management systems, it is especially important to be careful about which tools can handle protected health information.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Companies can also support remote answering security by providing staff with pre-configured devices that meet security requirements and use encrypted virtual private networks (VPNs) to protect online activity.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Providers will need to access electronic health record systems while working remotely, which poses a potential threat to businesses as employees access information through unsecured home internet connections. By implementing VPNs, providers can provide a secure, encrypted line of communication between the office network and the home network.<\/span><\/p>\n\n\n<h3><b>Protect IoMT devices from cyber attacks<\/b><\/h3>\n<p>&nbsp;<span style=\"font-weight: 400;\">Internet of Medical Things (IoMT) devices pose a significant challenge for many organizations. The reason is that these devices are more difficult to monitor and secure than other cordless tools. While healthcare continues to grow as one of the sectors most targeted by cybercriminals, security teams must find a way to protect them efficiently and effectively.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Some quick ways to secure IoMT devices can be to simply change passwords or add passwords to your network. Companies can also address network vulnerabilities, employ detection controls to better monitor network traffic, or introduce network segmentation to prevent unauthorized agents from accessing data anywhere on the system. These, among others, can help healthcare providers stay ahead of potential attacks and help secure the network.<\/span><\/p>\n\n\n<h2><b>A holistic approach to health cybersecurity<\/b><\/h2>\n<p>&nbsp;<span style=\"font-weight: 400;\">HIPAA rules are not enough to resist cybercrime. Looking at exactly what this law requires, it doesn\u2019t necessarily align with cybersecurity best practices.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">Furthermore, healthcare organizations should not view cybersecurity and HIPAA compliance as separate components, but rather as two concepts that work in parallel with each other. In fact, a robust cybersecurity program supports compliance.<\/span><\/p>\n<p>&nbsp;<span style=\"font-weight: 400;\">To ensure cybersecurity in healthcare and prevent sophisticated attacks, healthcare organizations can implement the following practices:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review your current security risk analysis and identify gaps and areas for improvement. Verify risk analysis is documented to ensure regulatory compliance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluate risk management plans to ensure measures to mitigate vulnerabilities are identified. Adopt the best practices used in the health area. It is mandatory to use unique identities, strong passwords, role-based permissions, automatic timeout and screen lock.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compare HIPAA and other cyber policies and procedures with legal and regulatory obligations and ensure they are updated based on the results of your most recent risk analysis.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Expect the unexpected. Prepare security incident response plans that meet the requirements of HIPAA and other applicable laws so your business is ready to respond to a potential data breach. Also, leave some time in your strategy for the unexpected. This can include everything from cyber attacks to natural disasters threatening your health records and other vital assets.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create backups and develop a recovery plan. While creating backups seems like a common sense thing, this practice can be lost in a small practice environment. Making sure the media used to store your backup data is secure and cannot be wiped out by an attack that would bring down your office systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execute additional investments in people, processes, technology and management. The defense of digital assets can no longer be delegated to IT alone. Instead, security planning needs to be combined with new products and services, security, development plans, and business initiatives.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You can\u2019t afford to neglect cybersecurity or compliance. That\u2019s why it\u2019s critical to combine them into a secure network that protects your patients and your reputation.<\/span><\/p>\n\n\n\n<h2><b>How Privileged Access Management is mapped to HIPAA compliance<\/b>&nbsp;<\/h2>\n<p><span style=\"font-weight: 400;\">PAM solutions give administrators the ability to control access to systems that manage confidential protected health information (PHI) or electronic protected health information (EPHI).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best PAM solutions ensure that only authenticated, authorized and approved connections are established. They provide a complete audit trail showing the \u201cwho, what, when, where and why\u201d of patient data access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following is a look at some existing HIPAA standards and understand how PAM can address intended security and compliance requirements.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement policies and procedures to prevent, detect, contain and correct security breaches: A PAM solution provides ways to define the IT control environment. If configured correctly, the PAM solution provides security measures to ensure proper confidentiality, integrity, and access authorization\/authentication for ePHI. Access control can be based on user groups and devices, integrated with time, location and granular workflows.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify the security officer responsible for developing and implementing the policies and procedures required by this subpart for the entity: PAM can ensure that security officers are able to define and implement privileged access to the system. As additional control, this individual should not be able to access the underlying privileged systems themselves, but only have admin rights on the PAM solution. This segregation of duties, as enforced by a PAM solution, is the essence of effective compliance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement policies and procedures to ensure that all members of your workforce have adequate access to electronically protected health information and to prevent workforce members who do not have access to electronically protected health information: A PAM solution is capable of creating administrative user profiles and group profiles with ePHI access privileges such as View, Modify, Run and None.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement technical policies and procedures for electronic information systems that maintain electronically secure health information to allow access only to persons or software programs that have been granted access rights: This standard is about PAM, the central authentication and authorization of all users. This feature reduces the risk of access by former employees and unauthorized third parties, for example.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Implement policies and procedures to limit physical access to your electronic information systems and the facilities in which they are hosted, while ensuring that properly authorized access is allowed: The best PAM solutions manage the passwords of target devices so that users and third parties are never aware of the password and therefore cannot access devices locally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As with any type of compliance, the ultimate challenge is to establish controls and keep the cost down. The IT environments found in most healthcare organizations are heterogeneous devices, systems and applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Monitoring, analyzing and reporting connected sessions can be cost prohibitive. Resources for compliance are finite. At a minimum, these resources are often needed for more strategic projects. senhasegura offers a complete approach to the privileged access management aspects of HIPAA compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Schedule a demo with our experts and find out why senhasegura can meet your needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Infrastructure security breaches damage healthcare orga [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-49940","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Health: What it is and how to comply with HIPAA - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Health: What it is and how to comply with HIPAA - Version 2\" \/>\n<meta property=\"og:description\" content=\"Infrastructure security breaches damage healthcare orga [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-09T01:44:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Cybersecurity Health: What it is and how to comply with HIPAA\",\"datePublished\":\"2022-05-09T01:44:02+00:00\",\"dateModified\":\"2022-05-30T02:42:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/\"},\"wordCount\":2164,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/\",\"name\":\"Cybersecurity Health: What it is and how to comply with HIPAA - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\",\"datePublished\":\"2022-05-09T01:44:02+00:00\",\"dateModified\":\"2022-05-30T02:42:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Health: What it is and how to comply with HIPAA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Health: What it is and how to comply with HIPAA - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Health: What it is and how to comply with HIPAA - Version 2","og_description":"Infrastructure security breaches damage healthcare orga [&hellip;]","og_url":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/","og_site_name":"Version 2","article_published_time":"2022-05-09T01:44:02+00:00","article_modified_time":"2022-05-30T02:42:10+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Cybersecurity Health: What it is and how to comply with HIPAA","datePublished":"2022-05-09T01:44:02+00:00","dateModified":"2022-05-30T02:42:10+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/"},"wordCount":2164,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/","url":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/","name":"Cybersecurity Health: What it is and how to comply with HIPAA - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg","datePublished":"2022-05-09T01:44:02+00:00","dateModified":"2022-05-30T02:42:10+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Cybersecurity-Health-What-it-is-and-how-to-comply-with-HIPAA.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/cybersecurity-health-what-it-is-and-how-to-comply-with-hipaa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Health: What it is and how to comply with HIPAA"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cZu","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=49940"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49940\/revisions"}],"predecessor-version":[{"id":49947,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/49940\/revisions\/49947"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=49940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=49940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=49940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}